January 22, 2018 asvignesh 1Comment

Ransomware is a type of malicious software from cryptovirology that threatens to publish the victim’s data or perpetually block access to it unless a ransom is paid. Ransomware is different from other attacks that it’s all about storage. The hacker’s application locks up your storage by encrypting it and more advanced malware uses a technique called cryptoviral extortion, in which it encrypts the victim’s files, making them inaccessible, and demands a ransom payment to decrypt them and you either unravel the rogue code’s encryption or start learning about blockchain technology and shipping bitcoins into the ether. Recently, An Indiana hospital…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

January 15, 2018 asvignesh

Today’s developers and organizations are migrating large, monolithic legacy applications to microservice-based architectures to improve scalability and developer velocity. However, these benefits come at a cost, namely integration complexity. Additionally, developers still often interact directly with the infrastructure, whether it be virtual machines (VMs) or containers via Kubernetes or another container orchestrator. Serverless is the next evolution of application and system design and deployment. Serverless applications are built upon functions—small code artifacts, which are compact and specific to a discrete task. Serverless doesnt means servers are no more required to run workloads, it simply means that developers no longer has…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

January 9, 2018 asvignesh

Amazon AWS Lambda functions are becoming more popular. Where I don’t need to setup and manage servers to Dev and deploy my code. Currently Lambda supports node Java python and C#. In the AWS reInvent AWS .Net team showed the demo of upcoming feature runtime executing a full ASP.NET core application with ASP.NET Razor pages. They showed the demo with AWS XRay . They have preannounced the support for .NET core 2.0 in AWS Lambda. Watch Deploying application on AWS with .NET core https://www.youtube.com/watch?v=IfF1E2RJ6Do

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

October 31, 2017 asvignesh

  First stop the AWS EC2 Instance Create the EBS snapshot of the volume which you want to encrypt Copy the EBS snapshot which you created in the previous step to same availability zone and check the Encryption check box Create the new EBS volume from the encrypted EBS snapshot Now the newly created EBS volume is Encrypted Detach the root volume and attach the new Encrypted volume with the same device name ( /dev/sda1 )

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

August 8, 2015 asvignesh

I’ve been developing an automation scripts to provision and expand VMFS Datastore. Expand not Extent… I increased the storage volume size and need to increase the size of VMFS datastore without affording the downtime Here is the VIjava / YAVI Java code for expanding the datastore   https://gist.github.com/cd02090562b8cf2ee0e3  

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

May 22, 2015 asvignesh 1Comment

VSS hardware provider can be initiate and test using DiskShadow Commands Open the Powershell and Enter Diskshadow PS C:\Users\Administrator> diskshadow Microsoft DiskShadow version 1.0 Copyright (C) 2013 Microsoft Corporation On computer: WIN-VigneshDev, 5/22/2015 12:06:35 AM DISKSHADOW> List the Hardware Providers DISKSHADOW> list providers * ProviderID: {74600e39-7dc5-4567-a03b-f091d6c7b092} Type: [2] VSS_PROV_SOFTWARE Name: Hyper-V IC Software Shadow Copy Provider Version: 1.0.0.0 CLSID: {3e02620c-e180-44f3-b154-2473646e4cb8} * ProviderID: {89300202-3cec-4981-9171-19f59559e0f2} Type: [4] VSS_PROV_FILESHARE Name: Microsoft File Share Shadow Copy provider Version: 1.0.0.1 CLSID: {fce59da7-7bac-40da-8d21-3e7311ba51cd} * ProviderID: {b57190af-4567-4dd0-ad8d51abd60b20d5 Type: [3] VSS_PROV_HARDWARE Name: Vignesh Test Provider Version: 6.2.9200.16384 * ProviderID: {b5946137-7b9f-4925-af80-51abd60b20d5} Type: [1] VSS_PROV_SYSTEM Name: Microsoft Software Shadow Copy…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

January 6, 2015 asvignesh

Inconsistent Backup The oldest type of backup probably not consistent. The process of taking the backup was so simple, backup application starts at the beginning of a file structure and copies all of the data until it reaches the end, resulting in a backup (Inconsistent). The reason which can make this backup inconsistent is that if any user added/modified after a backup but before it completed that would result in an inconsistent backup; the files in the backup are not consistent. Mainly the volumes which have Random read and random writes application like databases these types of backups do not…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

October 9, 2014 asvignesh

VMware vCenter 5.1 and before the default behavior was to allow all domain admins to login and administrate your ESXi hosts. Once the 5.5 vCenter installed if you try and connect using a domain account you will get the error :The vSphere Client could not connect to “FQDN / IP”. You do not have permission to login to the server: FQDN / IP   To get domain credentials to work you need to login to the VMware vSphere Web Client and setup the relevant permissions. So how to login to vCenter using web client if domain users are not allowed?…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.

September 19, 2014 asvignesh

Setup Environment I have one Ubuntu server for iSCSI target and one Windows Machine for Initiator Target Server vignesh@vignesh-server:~$ sudo su root@vignesh-server:~$ apt-get update root@vignesh-server:~$ apt-get install iscsitarget Note : If you have changed the kernel version (Upgraded your Ubuntu ) you may hit FATAL: Module iscsi_trgt not found. if you hit this issue run apt-get install iscsitarget-dkms Creating Virtual Disk Create a new virtual disk of desired size,I am creating 5000M root@vignesh-server:~$ mkdir /mnt/iscsi root@vignesh-server:~$ dd if=/dev/zero of=/mnt/iscsi/scsivdisk.img bs=1M count=5000 Note dd is the Unix command , reads from STDIN and STDOUT but these can be change using if…

Software developer experience in building storage management and Data protection software for the Private and public cloud.

Disclaimer :

This is a personal weblog. The opinions expressed here represent my own and not those of my employer. my thoughts and opinions change from time to time… This weblog is intended to provide a semi-permanent point in time snapshot and manifestation of the various memes running around my brain, and as such any thoughts and opinions expressed within out-of-date posts may not the same, nor even similar, to those I may hold today.